Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Improved Multiple to One Fully Homomorphic Encryption on the Integers
(Articles)
Chaoju Hu
,
Jianwei Zhao
Journal of Computer and Communications
Vol.6 No.9
,September 12, 2018
DOI:
10.4236/jcc.2018.69005
748
Downloads
1,443
Views
Citations
An Application of Linear Automata to Near Rings
(Articles)
Songfa You
,
Yijun Feng
,
Ming Cao
,
Yaping Wei
Applied Mathematics
Vol.3 No.11
,November 14, 2012
DOI:
10.4236/am.2012.311223
2,778
Downloads
4,451
Views
Citations
Jordan Semi-Triple Multiplicative Maps on the Symmetric Matrices
(Articles)
Xiaoning Hao
,
Pengxiang Ren
,
Runling An
Advances in Linear Algebra & Matrix Theory
Vol.3 No.2
,June 14, 2013
DOI:
10.4236/alamt.2013.32003
2,893
Downloads
6,760
Views
Citations
Applications of Homomorphism on the Structure of Semigroups
(Articles)
Huishu Yuan
,
Xiangzhi Kong
Advances in Pure Mathematics
Vol.4 No.2
,February 28, 2014
DOI:
10.4236/apm.2014.42010
4,469
Downloads
7,177
Views
Citations
Note on Fully Modified Estimation for Three-Regime Threshold Cointegration Model
(Articles)
Chien-Ho Wang
Theoretical Economics Letters
Vol.4 No.6
,June 27, 2014
DOI:
10.4236/tel.2014.46063
4,226
Downloads
5,462
Views
Citations
Reduction in the Corrosion Rate of Magnesium and Magnesium Alloy Specimens and Implications for Plain Fully Bioresorbable Coronary Artery Stents: A Review
(Articles)
Gladius Lewis
World Journal of Engineering and Technology
Vol.4 No.4
,November 9, 2016
DOI:
10.4236/wjet.2016.44055
1,732
Downloads
2,803
Views
Citations
Discussion of New Padding Method in DES Encryption
(Articles)
Chengxia Liu
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 17, 2013
DOI:
10.4236/jsea.2012.512B004
3,301
Downloads
4,558
Views
Citations
Improved High Definition Multimedia Interface Authentication Mechanism
(Articles)
R. N. Iyare
,
S. D. Walker
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212003
3,050
Downloads
3,544
Views
Citations
Ambiguous Multi-Symmetric Scheme and Applications
(Articles)
Richard Bassous
,
Ahmad Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George Corser
Journal of Information Security
Vol.8 No.4
,October 31, 2017
DOI:
10.4236/jis.2017.84024
712
Downloads
1,381
Views
Citations
Image Encryption Algorithm Based on a Chaotic Iterative Process
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.12
,December 17, 2012
DOI:
10.4236/am.2012.312262
5,097
Downloads
7,982
Views
Citations
Image Encryption Scheme Based on Filter Bank and Lifting
(Articles)
Saleh Saraireh
,
Yazeed Al-Sbou
,
Ja’afer Al-Saraireh
,
Othman Alsmadi
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 24, 2014
DOI:
10.4236/ijcns.2014.71006
3,222
Downloads
5,110
Views
Citations
An Image Encryption Method Based on Quantum Fourier Transformation
(Articles)
Ying Liu
,
Bing Zhou
,
Zijing Li
,
Jiangnan Deng
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.3
,July 30, 2018
DOI:
10.4236/ijis.2018.83004
515
Downloads
910
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
631
Downloads
1,328
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
On the Full Transitivity of a Cotorsion Hull of the Pierce Group
(Articles)
Tariel Kemoklidze
Advances in Pure Mathematics
Vol.4 No.3
,March 28, 2014
DOI:
10.4236/apm.2014.43012
2,512
Downloads
3,567
Views
Citations
Fully Stressed Design of Fink Truss Using STAAD.Pro Software
(Articles)
Avanti Patrikar
,
K. K. Pathak
Open Journal of Civil Engineering
Vol.6 No.4
,September 21, 2016
DOI:
10.4236/ojce.2016.64051
2,777
Downloads
4,782
Views
Citations
Costing Break Down of Fully Fashioned Knitwear
(Articles)
A. T. M. Mohibullah
,
Umme Magreba Takebira
,
Saiful Islam
,
Md. Abdur Rahman Robin
,
Mustafizur Rahman Shipto
,
Razu Ahmed
,
Md. Fazlay Rabby
,
Laila Zaman
Journal of Textile Science and Technology
Vol.6 No.4
,September 30, 2020
DOI:
10.4236/jtst.2020.64013
203
Downloads
874
Views
Citations
On Some Embedment of Groups into Wreath Products
(Articles)
Enoch Suleiman
,
Muhammed Salihu Audu
Advances in Pure Mathematics
Vol.11 No.2
,February 5, 2021
DOI:
10.4236/apm.2021.112007
38
Downloads
89
Views
Citations
Image Encryption Based on the General Approach for Multiple Chaotic Systems
(Articles)
Qais H. Alsafasfeh
,
Aouda A. Arfoa
Journal of Signal and Information Processing
Vol.2 No.3
,September 27, 2011
DOI:
10.4236/jsip.2011.23033
5,474
Downloads
10,605
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
4,847
Downloads
8,261
Views
Citations
Privacy Preserving Scheme for Location-Based Services
(Articles)
Youssef Gahi
,
Mouhcine Guennoun
,
Zouhair Guennoun
,
Khalil El-Khatib
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32013
5,714
Downloads
11,174
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top